[1] |
WU Chensi, XIE Weiqiang, JI Yixiao, et al. Summary of Network System Security Measurement[J]. Journal on Communications, 2019,40(6):14-31.
|
|
吴晨思, 谢卫强, 姬逸潇, 等. 网络系统安全度量综述[J]. 通信学报, 2019,40(6):14-31.
|
[2] |
GONG Jian, ZANG Xiaodong, SU Qi, et al. Summary of Cyber Security Situational Awareness[J]. Journal of Software, 2017,28(4):1010-1026.
|
|
龚俭, 臧小东, 苏琪, 等. 网络安全态势感知综述[J]. 软件学报, 2017,28(4):1010-1026.
|
[3] |
TIAN Jianwei, TIAN Zheng, QI Wenhui, et al. Quantitative Assessment Method of Multi-node Network Security Sitsuation Based on Threat Propagation[J]. Journal of Computer Research and Development, 2017,54(4):731-741.
|
|
田建伟, 田峥, 漆文辉, 等. 基于威胁传播的多节点网络安全态势量化评估方法[J]. 计算机研究与发展, 2017,54(4):731-741.
|
[4] |
WEN Zhicheng, CHEN Zhigang, TANG Jun. Quantitative Assessment Method of Network Security Situation Based on Information Fusion[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016,42(8):1593-1602.
|
|
文志诚, 陈志刚, 唐军. 基于信息融合的网络安全态势量化评估方法[J]. 北京航空航天大学学报, 2016,42(8):1593-1602.
|
[5] |
ZHANG Lei, CUI Yong, LIU Jing, et al. Application of Machine Learning in Cyberspace Security Research[J]. Chinese Journal of Computers, 2018,41(9):1943-1975.
|
|
张蕾, 崔勇, 刘静, 等. 机器学习在网络空间安全研究中的应用[J]. 计算机学报, 2018,41(9):1943-1975.
|
[6] |
XI Rongrong, YUN Xiaochun, ZHANG Yongzheng, et al. An Improved Quantitative Eevaluation Method of Network System Security Situation[J]. Chinese Journal of Computers, 2015,38(4):749-758.
|
|
席荣荣, 云晓春, 张永铮, 等. 一种改进的网络系统安全态势量化评估方法[J]. 计算机学报, 2015,38(4):749-758.
|
[7] |
MADAN B B, KATERINA Goseva-PoPstojanova, Vaidyanathan K, et al. A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems[J]. Performance Evaluation, 2004,56(1-4):167-186.
doi: 10.1016/j.peva.2003.07.008
URL
|
[8] |
WANG Yuanzhuo, LIN Chuang, CHENG Xueqi, et al. Quantitative Analysis Method of Network Attack and Defense Based on Random Game Model[J]. Chinese Journal of Computers, 2010,33(9):1748-1762.
doi: 10.3724/SP.J.1016.2010.01748
URL
|
|
王元卓, 林闯, 程学旗, 等. 基于随机博弈模型的网络攻防量化分析方法[J]. 计算机学报, 2010,33(9):1748-1762.
|
[9] |
JIANG Wei, FANG Binxing, TIAN Zhihong, et al. Research on the Selection of Defense Strategy Based on Offensive and Defensive Random Game Model[J]. Journal of Computer Research and Development, 2010,47(10):1714-1723.
|
|
姜伟, 方滨兴, 田志宏, 等. 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2010,47(10):1714-1723.
|
[10] |
PETERSON J. Petri Net Theory and Modeling of Systems[M]. Englewood Ciffs: Prentichall, 1981.
|
[11] |
LIN Chuang. Stochastic Petri Nets and System Performance Evaluation[M]. Beijing: Tsinghua University Press, 2000.
|
|
林闯. 随机Petri网和系统性能评价[M]. 北京: 清华大学出版社, 2000.
|
[12] |
MOLLOY M K. Performance Analysis Using Stochastic Petri Nets[J]. IEEE Transactions on Computers, 1982,31(9):913-917.
|